Device Authority reveals its enterprise IoT security blueprint

Rao Cherukuri of Device Authority

Device Authority, a global provider of Identity and Access Management (IAM) for the Internet of Things (IoT), has announced its Enterprise IoT Security Blueprint. This is a framework for organisations implementing strong IoT identity and data security operations in any environment, detailing key requirements, components and guidelines to be considered.

The IoT presents a substantial business opportunity across almost every industry. But to realise this opportunity, Enterprises must focus on solving the increasing security threat landscape from IoT devices and applications. New security challenges are introduced by the scale and pace of adoption, new business models evolving, as well as the physical consequences of compromised security.

Until now, security has been treated as an afterthought; by adding layers of security after devices are delivered, with infrastructure and applications already in place. But security for IoT is too important to be treated as an afterthought as echoed by EU GDPR and UK Government’s DCMS “Secure by Design” report. The unique characteristics of IoT are also forcing a fundamental reconsideration about how Enterprises need to implement security management for devices and data.

“For any organisation building their IoT strategy, who require trust and deal with scale at the edge, the Enterprise IoT Security Blueprint provides step by step guidelines for achieving a robust, secure solution from the beginning.

Device Authority and its extensive partner ecosystem can implement these solutions today,” said Rao Cherukuri, author of Blueprint and CTO of Device Authority.

Device Authority’s KeyScaler platform plays a major role by allowing organisations to automate and deliver owner-controlled security posture as per the IoT platform/application requirements and also integrate with the Enterprise IT security infrastructure. KeyScaler makes Enterprises ‘IoT ready’, by allowing them to leverage IoT Application Enablement Platforms (AEPs) and use Certificate Authorities (CAs) and Hardware Security Modules (HSMs) for security operations.

Unlike traditional InfoSec solutions, the blueprint addresses the core challenges of device trust (identity, integrity), data trust (security, privacy) and operational efficiency at IoT scale, beyond the boundaries of the secure Enterprise. This combines technology from ecosystem partners into a secure, market ready solution – solving the fundamental security and operational challenges for Enterprises today.

Comment on this article below or via Twitter: @IoTNow OR @jcIoTnow

Recent Articles

Services firm ISS partners with Haltian to build smart facilities

Posted on: May 29, 2020

Facility services company ISS requires an Internet of Things (IoT) platform that is secure, reliable, and easily scaled and modified to customers’ needs. Finnish IoT and product development company Haltian has already been the main provider of IoT solutions for ISS Finland, and now the co-operation is to be extended globally.

Read more

‘0G’ in the management of epidemics

Posted on: May 28, 2020

The coronavirus epidemic has turned into a pandemic. The lack of hindsight and visibility in the face of increasing numbers of victims and the overloading of emergency services has led to the lockdown of half the planet. This containment impacts and will impact all economies, but even more so the economies of developing countries.

Read more